Selecting fault revealing mutants
نویسندگان
چکیده
منابع مشابه
Selecting Fault Revealing Mutants
Mutant selection refers to the problem of choosing, among a large number of mutants, the (few) ones to be used by the testers. We thus, investigate the problem of selecting the fault revealing mutants, i.e., the mutants that are most likely to lead to test cases that uncover unknown program faults. We formulate this problem as the fault revealing mutant selection and as the fault revealing muta...
متن کاملA Method of Selecting for Auxotrophic Mutants of Hela Cells
1. Aminopterin prevents the multiplication of HeLa cells in Eagle's medium. The joint addition of adenine and thymidine removes the inhibition. 2. The aminopterin-induced thymine deficiency specifically results in a cessation of cell division and a doubling in the average protein content of the cells. Continued starvation for thymine results in the inability of cells to proliferate after aminop...
متن کاملSelecting Libraries, Selecting Documents, Selecting Data
We use “selecting” as a general term for selection processes, including filtering, retrieval, routing, and searching. The search for recorded knowledge in a digital library environment is examined in terms of selection at three levels: 1. Selecting which library (repository) to look in; 2. Selecting which document(s) within a library to look at; and 3. Selecting fragments of data (text, numeric...
متن کاملA Method for Producing, Selecting, and Isolating Photosynthetic Mutants of Euglena gracilis.
A method was developed for the isolation of photosynthetic mutants of Euglena gracilis. It consists of the following steps. (a) Incubation of the cells under phototrophic conditions in the presence of 3 (3,4-dichlorophenyl)-1, 1-dimethylurea for 1 week. This step caused a drastic reduction in the number of chloroplasts per cell; (b) mutagenesis with N-methyl-N'-nitro-N-nitrosoguanidine; (c) pho...
متن کاملFault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Performance monitors are provided in modern day computers for observing various features of the underlying microarchitectures. However the combination of underlying microarchitectural features and performance counters lead to sidechannels which can be exploited for attacking cipher implementations. In this paper, to the best of our knowledge we study for the first time, the combination of branc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Empirical Software Engineering
سال: 2019
ISSN: 1382-3256,1573-7616
DOI: 10.1007/s10664-019-09778-7